摘要:
A method for managing a point-to-point call initiated (702) between a wireless mobile station (114, 400) and a remote party while the mobile is receiving broadcast content via one or more multi-user forward-link broadcast channels (508). The mobile station notifies (704) the network (110) of preferences as to prescribed categories of operating conditions, such as whether to continue receiving the broadcast content, and election between the point-to-point call and the broadcast content should network resources be unable to conduct the point-to-point call and broadcast content concurrently. In accordance with the preferences, communications are conducted (706) in one of the following operating modes: (1) conducting the point-to-point call and discontinuing reception of the broadcast, (2) conducting the point-to-point call and continuing reception of the broadcast, (3) aborting completion of the point-to-point call and continuing reception of the broadcast.
摘要:
The present invention relates to a salt of carvedilol and/or corresponding solvates thereof, compositions containing such carvedilol and/or corresponding solvates thereof, and/or methods of using the aforementioned compound(s) in the treatment of certain disease states in mammals, in particular man.The present invention further relates to carvedilol phosphate salts, and/or solvates thereof, which include a novel crystalline form of carvedilol dihydrogen phosphate (i.e., which is the dihydrogen phosphate salt of 1-(carbazol-4-yloxy-3-[[2-(o-methoxyphenoxy)ethyl]amino]-2-propanol) and/or carvedilol hydrogen phosphate, etc.) and/or other corresponding solvates thereof, compositions containing these carvedilol phosphate salts and/or solvates, and methods of using the aforementioned salts and/or solvates to treat hypertension, congestive heart failure and angina, etc.
摘要:
A security pin includes a first sleeve, a second sleeve and a core. An end surface of the first sleeve contacts with an end surface of the second sleeve, and the core is positioned in the first sleeve and the second sleeve. The breakpoint of security pin is determined by the material and the size of the core. The core is not easily broken when applied by an external force. The security pin also has a relatively precise breakpoint.
摘要:
A distant measurement method and a distant measurement system are provided. The distant measurement method includes the following steps: emitting a first light beam and a second light beam from an emitting terminal, wherein the first light beam travels toward a target; providing a switching sequence by a switch mechanism; placing a receiving terminal to receive the first light beam reflected from the target in accordance with the switching sequence and correspondingly provide a first electrical signal, and to receive the second light beam and correspondingly provide a second electrical signal; and utilizing a controlling terminal to receive the first and second electrical signals, and calculate distance between the distant measurement system and the target in accordance with a phase differential formed between the first and second electrical signals.
摘要:
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel.
摘要:
Aspects describe selection of a mobility protocol after a mobile device has been authenticated with a network. Selection of mobility protocol after authentication can mitigate the amount of time needed to implement the mobility protocol. The mobility protocols include a simple IP protocol, a proxy mobile IP protocol, and a client mobile IP protocol. Implementation of simple IP protocol and proxy mobile IP protocol are performed in a similar manner from the perspective of a mobile device. If IPCP negotiation is successful, proxy mobile IP protocol or simple IP protocol can be selected. If IPCP negotiation is not successful, client mobile IP protocol can be selected.
摘要:
Provided are compounds that are capable of modulating the activity of the influenza A virus via interaction with the M2 transmembrane protein. Also provided are methods for treating an influenza A-affected disease state or infection comprising administering a composition comprising one or more compounds that have been identified as being capable of interaction with the M2 protein.
摘要:
A lighting device includes a substantially cylindrical tube defining an interior and an exterior, and a longitudinal axis extending between a first end and a second end. The first end of the tube defines a substantially cylindrical opening disposed in a plane at a first angle that is substantially perpendicular to the longitudinal axis, and the second end of the tube defines a substantially elliptical opening disposed in a plane at a second angle that is substantially non-perpendicular to the longitudinal axis. A reflective surface is provided on the interior of the tube, and a substantially cylindrical flashing is provided about the exterior of the tube. A substantially transparent dome is coupled to the tube proximate the first end, and a diffuser is coupled to the tube proximate the second end.
摘要:
Devices and methods are provided for handing off an access terminal from a macro base station to a femto access point (AP). In one embodiment, the method involves receiving a facilities directive or the like from a communication network entity, such as, for example, a serving mobile switching center (MSC). The method may involve selecting the femto AP based at least in part on femto configuration information, which may include at least one global identifier of the femto AP. The method may involve determining a uniform resource identifier of the femto AP based at least in part on at least one global identifier (e.g., MSC identifier and/or cell identifier).
摘要:
The present invention provides a compound powder for making magnetic powder cores, a kind of magnetic powder core, and a process for making them. Said compound powder is a mixture composing of powder A and powder B, the content of powder A is 50-96 wt. % and the content of powder B is 4-50 wt. %, wherein powder A is at least one selected from iron powder, Fe—Si powder, Fe—Si—Al powder, Fe-based nanocrystalline powder, Fe-based amorphous powder, Fe—Ni powder and Fe—Ni—Mo powder; powder B bears different requirement characteristics from powder A and is at least one selected from iron powder, Fe—Si powder, Fe—Si—Al powder, Fe-based nanocrystalline powder, Fe-based amorphous powder, Fe—Ni powder and Fe—Ni—Mo powder. Said powder B adopts Fe-based amorphous soft magnetic powder with good insulation property as insulating agent and thus core loss of magnetic powder core decreases. The decrease of magnetic permeability of magnetic powder core resulting from a traditional insulating agent is remedied and the initial magnetic permeability of magnetic powder core is improved by taking advantage of soft magnetic properties of Fe-based amorphous powder.